Page MenuHome GnuPG

Rate limit password attempts by pinentry.
Closed, ResolvedPublic

Description

GPG Agent tries to prevent brute forcing the passphrase. However, it doesn't
rate limit pinentry. If an incorrect passphrase is entered, gpg agent should
sleep for 100ms before replying to pinentry thereby limiting the rate to 10
tries per second without noticeably impacting the user interaction. See issue
2034 for details.

Event Timeline

Each test for a passphrase takes about 100ms - thus you have your rate limit.

Is that okay or are concerned about keys with passphrsses generated on slower
boxes - they would indeed be checked faster than 100ms. Using gpg --passwd for
such keys adjusts the iteration count so that they will again be delayed by
about 100ms.

werner claimed this task.
werner added a project: Not A Bug.